SlideShare a Scribd company logo
IPSec Feasibility Study
May 2003 1
IPSec Feasibility Study (in cooperation
with DWD, Météo France, HNMS and
KNMI):
Summary and recommendations
Network and Security Section
Computer Division
May 2003
© Copyright 2003
European Centre for Medium-Range Weather Forecasts
Shinfield Park, Reading, Berkshire RG2 9AX, England
Literary and scientific copyrights belong to ECMWF and are reserved in all countries. This publication is not
to be reprinted or translated in whole or in part without the written permission of the Director. Appropriate
non-commercial use will normally be granted under the condition that reference is made to ECMWF.
The information within this publication is given in good faith and considered to be true, but ECMWF accepts
no liability for error, omission and for loss or damage arising from its use.
IPSec Feasibility Study
Contents
1 Introduction .....................................................................................................................................1
2 Technical Overview.........................................................................................................................2
2.1 IP VPN definition.....................................................................................................................2
2.2 IPSec protocol ..........................................................................................................................2
3 The IPSec Tests ...............................................................................................................................3
3.1 IPSec parameter settings...........................................................................................................3
3.2 The lab tests..............................................................................................................................5
3.3 Internet tests .............................................................................................................................6
4 Test Results......................................................................................................................................7
4.1 Test #1: Certificate enrolment and device authentication ........................................................7
4.2 Test #2: Data Integrity..............................................................................................................7
4.3 Test #3: Data Encryption..........................................................................................................7
4.4 Test #4: Performance tests........................................................................................................7
5 Recommendations............................................................................................................................9
5.1 Device authentication...............................................................................................................9
5.2 Data integrity............................................................................................................................9
5.3 Data encryption ........................................................................................................................9
5.4 The IPSec capable equipment ..................................................................................................9
5.5 Network Design......................................................................................................................10
6 Acknowledgement.........................................................................................................................11
Annex A - Configuration guidelines and examples ..........................................................................13
A.1 Output and configuration files for Cisco Router and PIX......................................................13
Cisco IOS: certificate enrolment guideline....................................................................................13
Cisco IOS: enrolment output .........................................................................................................13
Cisco IOS: IPSec configuration example ......................................................................................14
Cisco PIX: configuration example.................................................................................................15
A.2 FreeS/WAN configuration example.......................................................................................15
Annex B - References.......................................................................................................................17
Annex C - List of acronyms..............................................................................................................18
May 2003 i
IPSec Feasibility Study
1 Introduction
During 2002 ECMWF and four Member States (Germany, Greece, France and the Netherlands)
undertook IPSec tests in order to evaluate the feasibility of using an IPSec-based VPN as a back up
for the RMDCN and for the transfer of amounts of data, which are excessive relative to the capacity
of the RMDCN.
As most RMDCN sites have Internet access, using an IPSec-based VPN link as an additional backup,
in case of a failure of the RMDCN link and its associated ISDN backup, will help to guarantee service
continuity.
The RMDCN is a purpose-built network for real-time and operational data transfer and the various
allocated bandwidths have a limited throughput. The Internet can be used in addition to the RMDCN
to perform data transfer for cases where the RMDCN capacity is insufficient. However, it is worth
keeping in mind that:
The Internet lacks the concept of guaranteed bandwidth and QoS (Quality of Service) and is
subject to various attacks, including DoS (Denial of Service) attacks.
Long lasting outages occur on the Internet from time to time
This document reports on the results of the IPSec tests and provides guidelines and recommendations
for building secure connections over the Internet. It is divided into four parts:
Part 1 gives a brief introduction to Virtual Private Networks and IPSec.
Part 2 describes the IPSec tests that were carried out.
Part 3 presents the results of the tests.
Part 4 details the recommendations.
May 2003 1
IPSec Feasibility Study
2 Technical Overview
2.1 IP VPN definition
A Virtual Private Network is a group of two or more computer systems connected “securely” over a
public network. VPNs can be installed between an individual machine and a private network (remote
user-to-site) or between private networks (site-to-site). Security features differ from product to
product, but most security experts agree that VPNs should include encryption, strong authentication of
remote users or hosts, and mechanisms for hiding or masking information about the private network
topology from potential attackers on the public network.
2.2 IPSec protocol
IPSec is an end-to-end security protocol: all the functionality and intelligence of the VPN connection
reside at the end points, either in a gateway or in the end-host.
The service provider’s IP network is not aware of the existence of the IP VPN, as tunnelling
technologies ensure the transport of application data by encapsulation. The source address and the
destination address of these packets are the IP addresses of the end points of the tunnel. They are then
routed as any normal IP packets through the shared IP network.
In the past, several IP tunnelling protocols have been deployed. Over the last 3 years, however, IPSec
has become the predominant IP tunnelling protocol and is currently the technology of choice when
implementing site-to-site connectivity over a public network. IPSec was initially developed to ensure
private communications over public IP networks. The protocol supports two main security functions:
Authentication: ensuring the authenticity and the integrity of the whole IP packet;
Encryption: ensuring the confidentiality of the payload.
Through IPSec it is possible to define a tunnel between two gateways. An IPSec gateway would
typically be an access router or a firewall on which the IPSec protocol is implemented. IPSec
gateways sit between the user's private network and the carrier's shared network.
IPSec tunnels are established dynamically and released when they are not in use. To establish an
IPSec tunnel, two gateways must authenticate themselves and define which security algorithms and
keys they will use for the tunnel. The entire original IP packet is encrypted and wrapped inside IPSec
authentication and encryption headers. This becomes the payload of a new IP packet whose source
and destination IP addresses are the public network IP addresses of the IPSec gateways. This ensures
the logical separation between VPN traffic flows in a shared IP network. Traditional IP routing is then
used between the tunnel end points.
IPSec achieves these objectives by using:
Two traffic security protocols: the Authentication Header (AH), which provides data integrity,
and the Encapsulation Security Payload (ESP), which provides data integrity and data
confidentiality.
A cryptographic-key management protocol: the Internet Key Exchange (IKE), which is used to
negotiate IPSec connections.
For further information about IPSec protocol, see the list of References in Annex B.
2 May 2003
IPSec Feasibility Study
3 The IPSec Tests
The main goals of these tests were:
Evaluate the feasibility of using IPSec tunnels to establish site-to-site connectivity:
Although several documents have been written regarding the implementation of IPSec and its
various issues, it was worth testing it, in order to gain a thorough understanding of the IPSec
protocol itself, to have an appreciation of its complexity and to evaluate the feasibility of its
implementation in the context of the RMDCN.
Test the interoperability of IPSec :
The meteorological centres connected to the RMDCN may already have some equipment (router,
firewall, etc.), which is IPSEC capable. Even if interoperability will not be an issue today, the
interoperability of different devices has to be checked.
Define global recommendations:
RMDCN sites that are considering implementations of IPSec can use this document and its
recommendations as a starting point.
3.1 IPSec parameter settings
As it was not feasible to test all IPSec features and capabilities, the tests focused on a subset. An
initial option was chosen for each IPSec parameter:
Tunnel mode vs. Transport mode
Both AH and ESP protocols operate in two modes: transport mode and tunnel mode. Each of these
modes has its wn applications:
Tunnel mode is commonly used to encrypt traffic between secure IPSec gateways.
Transport mode is used between end stations supporting IPSec or between an end station and a
gateway, if the gateway is regarded as a host.
As the aim of the tests was to investigate secure site-to-site connections, only IPSec “Tunnel mode”
was considered (see Figure 1 below) in the framework of this study.
Router
ECMWF
Router
IPSec/VPN Equipment
INTERNET
IPSec Tunnel
IPSec Tunnel
Figure 1 - IPSec “Tunnel mode” tests
Key exchange
IPSec Tunnel keys can be managed either manually or dynamically. For scalability and
maintainability reasons, IKE was used for the dynamic key management during the tests.
May 2003 3
IPSec Feasibility Study
Device authentication method
The IKE protocol is very flexible and supports multiple authentication methods. The two peers must
agree on a common authentication method through a negotiation process. The two main
authentication protocols are:
PreShared key:
The same key is configured on each IPSec peer. IKE peers authenticate each other by computing
and sending a keyed hash of data using the configured PreShared key. If the receiving peer is able
to create the same hash independently using its own PreShared key, it knows that both peers must
share the same secret, thus authenticating the other peer.
RSA (Rivest, Shamir, Adleman) Signature:
This uses a digital signature, where each device digitally signs a set of data and sends it to the
other party. RSA signatures use a CA (Certificate Authority) to generate a unique digital
certificate that is assigned to each peer for authentication. The digital certificate is similar in
function to the PreShared key, but provides much stronger security.
PreShared keys are easy to implement but do not scale well, as each IPSec peer must be configured
with the PreShared key of every other peer with which it will establish a session. In addition,
PreShared keys are less secures and are configured in clear text format in some equipment, for
example in a Cisco router.
Therefore, RSA signatures using x509 v.3 certificates were used.
Data integrity and authenticity
Data integrity is implemented by including a message digest (or fingerprint) of the data within the
IPSec packets. Message digests are calculated using hash functions. All IPSec capable devices should
support hash functions HMAC-MD5 and HMAC-SHA, as stated in the RFC (Request For Comments)
2401. Therefore, other less commonly used hash functions were ignored. HMAC-MD5 and HMAC-
SHA are based on MD5 and SHA combined with the additional crypto features of the HMAC
algorithm. This is done to avoid tampering with the message digest itself. MD5 produces a 128-bit
message digest and SHA produces a 160-bit message digest, therefore SHA is a more secure hash
function than MD5. However, the HMAC-SHA and HMAC-MD5 variants used are truncated to the
most significant 96 bits. Truncation has security advantages (less information on the hash available to
the attacker) and disadvantages (less bits to predict for the attacker). In our opinion both truncated
versions of HMAC-SHA and HMAC-MD5 are secure enough for our requirements.
In our test environment, both HMAC-SHA and HMAC-MD5 were used; there was a slight preference
for HMAC-SHA.
Data encryption
Data confidentiality is achieved in IPSec by the use of symmetric encryption algorithms and session
keys. The most commonly used algorithms are:
ESP-NULL: No encryption applied.
DES (Data Encryption Standard): Provides encryption using a 56 bit key.
3DES (Triple Data Encryption Standard): Provides encryption using a 168 bit key.
AES (Advanced Encryption Standard): Provides encryption using 128, 192, and 256 key lengths.
According to RFC 2401, all IPSec devices should support at least ESP-NULL and DES. However,
DES is considered a weak encryption algorithm due to its short key length, and as such, some vendors
discourage its use and some others refuse to support it (i.e. FreeS/Wan).
Therefore, for the purpose of this test, NULL (no encryption) and 3DES encryption were used
whenever possible. DES was only used when 3DES was not available.
4 May 2003
IPSec Feasibility Study
An international VPN/IPSec via Internet must comply with the legislation of each country
(encryption, size of the key…). Therefore, each site should be aware of national policy
before using encryption.
Session key exchange
Diffie-Hellman (DH) is a public-key cryptography protocol. It allows two parties to establish a shared
secret between them. DH is used within IKE to establish a shared secret that is used as a session key.
The most common DH groups are:
Group 1: Uses a 768 bit public key to establish a shared secret.
Group 2: Uses a 1024 bit public key to establish a shared secret.
For the purpose of the tests, DH Group 2 was used since it is more secure and does not create any
overhead for the IPSec devices.
3.2 The lab tests
In order to validate the selected parameter settings of the IPSec features and before performing any
external (through the Internet) tests, a test environment was set up at ECMWF to conduct some
preliminary experiments. The aim of these tests was to get familiarised with IPSec configuration and
the certificate enrolment process.
Figure 2 shows the configuration of the test environment.
Internet Firewall
Linux s/WAN Server
DMZ
Back-to-Back
DMZ
CA Server
IPSec Tunnel
X509 Certificates
Exchange
Test RouterInternet Access
Router
Figure 2 - Network configuration test environment
May 2003 5
IPSec Feasibility Study
With this setup, we were able to:
Test three different authentication methods: PreShared keys, public encryption (RSA_ENCR)
and public keys signed by a Certification Authority (RSA_SIG).
Test X509 certification enrolment and utilisation.
Perform basic IPSec configuration: build tunnels with the chosen IKE/IPSec parameters.
Test a public domain IPSec implementation: FreeS/WAN
Test IPSec interoperability between several devices.
The test environment was also used during the Internet tests to reproduce problems in order to fix
them.
3.3 Internet tests
Figure 3 shows an overall view of the IPSec tests performed across the public Internet. The objective
of these Internet tests was to build secure connections between ECMWF and the Member States and
use them to transfer data. Configuration examples can be found in Annex A.
X509 Certifcate
Exchange
Test Router Linux FreeS/WAN
Test Router
FRANCE - MeteoFrance
NETHERLANDS - KNMI
FireWall
Test Router
GERMANY - DWD
GREECE - HNMS
FireWall
UK - ECMWF
Internet Access Router
DMZ
DMZ
CA Server
Internet
Access Device
INTERNET
FireWall
FireWall
Internet
Access Device
Internet
Access Device
Internet
Access Device
IPSec Tunnel
Figure 4 - Network configuration for the Internet tests
6 May 2003
IPSec Feasibility Study
4 Test Results
The following sections briefly describe the four tests conducted with the Member States and highlight
some of the experiences.
4.1 Test #1: Certificate enrolment and device authentication
The purpose of this test was to see how the different devices would go through the certificate
enrolment process and use the X509 certificate for device authentication. If there were problems with
devices using X509 certificates, PreShared keys were configured manually in the device. Most of the
tested devices succeeded in enrolling and using certificates for authentication1
.
The main issues encountered during this test were due to the fact that the devices use different
certificate enrolment methods (mainly URL and “out-of-band” download) and diverse certificate
formats.
4.2 Test #2: Data Integrity
The purpose of this test was to establish basic IPSec connections using HMAC (SHA and MD5)
algorithm to check the data integrity. The IKE negotiation used the X509 certificate downloaded from
the CA server. Except for FreeS/WAN, which does not implement the AH protocol, all the tested
devices were able to establish AH and ESP HMAC IPSec tunnels.
4.3 Test #3: Data Encryption
This test is a follow-up of test #2; it adds 3DES encryption. When 3DES was not available, DES was
used. The tests were carried out successfully. However, it is important to take into account that
3DES/DES encryption capability depends on the device hardware and software versions.
4.4 Test #4: Performance tests
In order to evaluate the impact of IPSec tunnelling on the CPU, a set of FTP tests was undertaken.
Several FTP tests were carried out, both with and without the establishment of IPSec tunnels.
The configuration below (Figure 5) was used to conduct the FTP tests; router B represents a generic
remote router that guarantees the Internet connection to and from a Member State.
IPSec Tunnel
Back-to-Back
30.0.0.1
40.0.0.2
Ethernet
New-ftp
FTP server
Laptop
Back-to-Back
10.0.0.1
10.0.0.2
Back-to-Back
20.0.0.1
20.0.0.2
30.0.0.2
40.0.0.1 Router BRouter A Router Router
FTP Transfer
Figure 5 - FTP Tests Lab Setup
1
CheckPoint FW1 equipment: only the enrolment of the certificate was tested. FW1 requires a Control
Revocation List (CRL) to start the IPSec process. The use of CRLs was not included in the tests. This will be
done at a future stage.
May 2003 7
IPSec Feasibility Study
Tests were also conducted across the Internet between ECMWF and a Cisco PIX firewall at DWD in
Germany.
The main conclusions from the performance tests are:
IPSec protocol has a significant impact on the CPU load of the device.
Encrypted tunnels are more CPU consuming than non-encrypted ones.
HMAC-MD5 algorithm is slightly less CPU consuming than HMAC-SHA algorithm.
ESP protocol for data integrity is equally as CPU consuming as AH protocol.
A small IPSec capable router (such as a Cisco 1605) is not suitable for IPSec tunnelling when
the Internet connection speed is higher than 128 kb/s.
8 May 2003
IPSec Feasibility Study
5 Recommendations
The following recommendations are based on the results of the tests described in section 3. These
recommendations should help sites to build secure IPSec connections over the public Internet.
5.1 Device authentication
The use of X509 certificates for device authentication is recommended for the following reasons:
It is the most secure method.
It is the most scalable method.
Furthermore, the generation of 1024 bit RSA keys and the use of DH group 2 (encryption algorithm)
are recommended.
5.2 Data integrity
Both AH and ESP protocols can be used for packet authentication. However:
The tests showed that ESP consumes as much CPU load as AH.
Only ESP protocol can ensure packet encryption (see Section 4.3).
Therefore, for reasons of simplicity the use of ESP HMAC for packet authentication is recommended.
Also, either ESP-HMAC-MD5 or ESP-HMAC-SHA can be used.
5.3 Data encryption
Because of the nature of the data (meteorological) encryption is not strictly required. Since data
encryption is CPU consuming ensuring packet authentication provides enough security. Therefore, the
use of ESP NULL is recommended. This means that ESP will be applied to the packet with no
encryption.
If ever data encryption is needed, the implementation of ESP-3DES is recommended, as it is more
secure than DES.
5.4 The IPSec capable equipment
In the light of the previous recommendations (Sections 4-1 to 4-3), the following should be
considered, when selecting an IPSec-capable device to implement a VPN:
For scalability reasons, the device should be IKE capable and should support X509 certificate
standard.
It is important that the device supports ESP_NULL encryption method.
If considering data encryption, the equipment must be 3DES-capable. Moreover, it should be
taken into account that AES may soon become the de facto encryption standard. Therefore,
equipment that is also AES-capable is desirable, in order to anticipate future requirements.
For sites with a high speed Internet connection, a dedicated VPN/IPSec device with
encryption card (acceleration card) is recommended, as it significantly reduces the CPU load
when the IPSec protocol is used.
As a final note, the tests showed that it is easier to configure IPSec-capable equipment than to
implement a public domain solution. Nevertheless, an open source implementation, FreeS/WAN,
could be considered, bearing in mind that FreeS/WAN implements 3DES encryption by default (refer
to http://www.freeswan.org for further details).
May 2003 9
IPSec Feasibility Study
5.5 Network Design
When designing an IPSec implementation, a set of guidelines has to be taken into account. The VPN
gateway should always be in a DMZ and never inside the “private” network. This means that the VPN
device has to be somewhere between a Firewall and the external network (the Internet); all the traffic
between the VPN device and the private internal network should go through a Firewall, see Figure 6.
Because the VPN device is located on a DMZ, it is important to configure the Firewall to allow IPSec
traffic to and from it. The following table shows the IP protocols and TCP/UDP port numbers a
Firewall has to allow for IPSec to work:
Protocol/Port Comment:
IP protocol 50 ESP protocol
IP Protocol 51 AH protocol
UDP 500 IKE negotiation
UDP/TCP 10000 NAT tunnelling
To implement IPSec, it is not mandatory to use a dedicated IPSec device. It is possible to combine
IPSec and firewall capabilities or IPSec and Internet access capabilities or all three capabilities in a
single device.
The following diagram (Figure 6) shows a topology on which a dedicated VPN/IPSec device is used
in addition to the Internet access router and the Firewall.
INTERNET Firewall
INTERNET DMZ
VPN DMZ
VPN/IPSec
DEVICE
IPSec Tunnel
X509 Certificates
Exchange (IKE)
INTERNET
LAN
INTERNET
ACCESS
DEVICE
Figure 6 - VPN Network Design using a dedicated VPN device
10 May 2003
IPSec Feasibility Study
6 Acknowledgement
The following persons contributed to the study and the creation of this document:
Inge Essid, DWD
Ilona Glaser, DWD
Erwan Favennec, Meteo France
Georgios Konstandinidis, HNMS
Frits van de Peppel, KNMI
Freerk Feunekes, KNMI
Carmine Rizzo, ECMWF
Ahmed Benallegue, ECMWF
Matteo dell'Acqua, ECMWF
Ricardo Correa, ECMWF
Tony Bakker, ECMWF
Pam Prior, ECMWF
May 2003 11
IPSec Feasibility Study
12 May 2003
IPSec Feasibility Study
Annex A - Configuration guidelines and examples
A.1 Output and configuration files for Cisco Router and PIX
Cisco IOS: certificate enrolment guideline
The main points to consider when requesting a certificate from a Cisco Router are:
1- Configure the Router's Host Name and Domain Name: Use “hostname” and “ip domain-name”
global configuration commands.
2- Set the Router's Time and Date: ensure that the router's time zone, time and date have been
accurately configured with the “set clock” command. The clock must be set before generating
RSA key pairs and enrolling the certificate, as the keys and certificates are time-sensitive.
3- RSA key pairs must be generated using a modulus of 1024: using the “crypto key generate rsa”
command, generate RSA key pairs with a modulus of 1024.
4- Declare the CA and configure its parameters:
o To declare the CA: “crypto ca identity <CA identity>”
o To configure its parameters: “enrolment url <CA server URL>” and “crl optional”
o To authenticate the CA: “ca authenticate <CA identity>”
5- Request a X509 certificate: when requesting a X509 certificate, answer “no” when asked if you
want to include:
o The router serial number
o An IP address in the subject name
Cisco IOS: enrolment output
The following is the output from a certificate enrolment performed on a Cisco router:
! The first step is to generate the RSA key
Cisco-Test(config)#crypto key generate rsa
The name for the keys will be: mys-cisco.domain.top
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
Generating RSA keys ...
[OK]
! The second step is to identify the CA server
Cisco-Test(config)#ca iden
Cisco-Test(config)#crypto ca identity my-test
Cisco-Test(ca-identity)# enrollment url http://myca.domain.top/cgi-bin/openscep
Cisco-Test(ca-identity)# crl optional
Cisco-Test(ca-identity)#exit
Cisco-Test(config)#crypto ca authenticate my-test
Certificate has the following attributes:
Fingerprint: 8395FE5B C08238A7 FA6BFD76 727E84A7
% Do you accept this certificate? [yes/no]: yes
! The third step is to request a certificate from the CA server
Cisco-Test(config)#crypto ca enrol my-test
%
% Start certificate enrollment ..
% Create a challenge password. You will need to verbally provide this
password to the CA Administrator in order to revoke your certificate.
For security reasons your password will not be saved in the configuration.
Please make a note of it.
Password:
Re-enter password:
% The subject name in the certificate will be: my-cisco.domain.top
% Include the router serial number in the subject name? [yes/no]: no
% Include an IP address in the subject name? [yes/no]: no
Request certificate from CA? [yes/no]: yes
% Certificate request sent to Certificate Authority
% The certificate request fingerprint will be displayed.
% The 'show crypto ca certificate' command will also show the fingerprint.
Cisco-Test(config)#exit
May 2003 13
IPSec Feasibility Study
Cisco-Test#
! Once the 3 steps are completed, two certificates are available in the router: the CA certificate and the router‘s certificate
Cisco-Test#show crypto ca certificates
CA Certificate
Status: Available
Certificate Serial Number: 01
Key Usage: General Purpose
EA =<16> ca-email@domain.top
CN = Org
O = Org
L = Place
ST = county
C = Country
Validity Date:
start date: 08:51:38 GMT Apr 9 2002
end date: 08:51:38 GMT Apr 8 2012
Certificate
Status: Available
Certificate Serial Number: 3F
Key Usage: General Purpose
Subject Name
Name: my-test.domain.top
Validity Date:
start date: 15:56:14 GMT Jun 12 2002
end date: 15:56:14 GMT Jun 13 2007
Cisco IOS: IPSec configuration example
The following is an ESP-HMAC-SHA ESP-NULL IPSec tunnel configuration example:
hostname Cisco
!
! The time zone must be accurate, as the certificates are time sensitive
clock timezone GMT 0
!
! The following lines describe the CA server name and IP address
ip host myca.domain.top 191.168.1.1
ip domain-name domain.top
!
! CA identity command specifies the local name of the CA server
crypto ca identity my-test
enrollment url http://myca.domain.top/cgi-bin/openscep
crl optional
!
! The following lines are the certificates available in the router
crypto ca certificate chain my-test
certificate 36
30820338 308202A1 A0030201 02020136 300D0609 2A864886 F70D0101 04050030
****
B49B0FEF 07921B58 B9BD54B2 0713AE83 B6BA3CB4 B8D30EA8 95005EEA
quit
certificate ca 01
30820379 308202E2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
****
9A81DB7F 902EE833 800B9487 9634907E 9333BE95 88900068 7889AB95 51
quit
!
! The isakmp (ike) policy parameters are used when the router tries to establish the IKE tunnel
crypto isakmp policy 100
group 2
!
crypto isakmp policy 200
encr 3des
group 2
!
! “transform-set” command defines which kind of IPSec tunnelit is possible to establish
crypto ipsec transform-set MoreSecure esp-sha-hmac esp-null
!
! A crypto-map links a set of IPSec parameters with the remote IPSec gateway
crypto map IOS_IOS 10 ipsec-isakmp
description To Cisco-Test internal router
set peer 10.0.0.1
set transform-set MoreSecure
match address 151
!
! Finally, a crypto-map that will be used to establish IPSec tunnels is applied to the physical interface
interface FastEthernet4/0
ip address 10.0.0.2 255.0.0.0
crypto map IOS_IOS
!
! The mirror ACL will trigger the IPSec tunnel establishment
access-list 151 permit ip host 192.168.1.2 host 192.168.2.1 log
end
14 May 2003
IPSec Feasibility Study
Cisco PIX: configuration example
The following is a ESP-HMAC-SHA ESP-NULL IPSec tunnel configuration example for a Cisco
PIX:
PIX Version 6.2(1)
hostname pix
domain-name domain.top
!
****
!
! The following ACL will be used to trigger the IPSec tunnel establishment
access-list 101 permit ip host 192.168.3.1 host 192.168.1.2
! IPSec protocol must be enabled in the device
sysopt connection permit-ipsec
no sysopt route dnat
! “transform-set” command defines which kind of IPSec tunnel it will be possible to establish
crypto ipsec transform-set MoreSecure2 esp-null esp-sha-hmac
! A crypto map defines the IPSec parameters, which will be negotiated during the IPSec tunnel establishment
crypto map ECMWF_MSS 50 ipsec-isakmp
crypto map ECMWF_MSS 50 match address 101
crypto map ECMWF_MSS 50 set peer 192.168.4.1
crypto map ECMWF_MSS 50 set transform-set MoreSecure
crypto map ECMWF_MSS interface outside
! The isakmp (ike) policy parameters are used when the device tries to establish the IKE tunnel
isakmp enable outside
isakmp policy 10 authentication rsa-sig
isakmp policy 10 encryption des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
ca identity myca.domain.top 192.168.1.19:/cgi-bin/openscep
ca configure myca.domain.top ca 1 1 crloptional
A.2 FreeS/WAN configuration example
FreeS/WAN (ipsec.conf) configuration file for an ESP-HMAC-SHA ESP-3DES configuration
example:
# /etc/ipsec.conf - FreeS/WAN IPsec configuration file
# More elaborate and more varied sample configurations can be found
# in FreeS/WAN's doc/examples file, and in the HTML documentation.
# basic configuration
config setup
# THIS SETTING MUST BE CORRECT or almost nothing will work;
# %defaultroute is okay for most simple cases.
interfaces=%defaultroute
# Debug-logging controls: "none" for (almost) none, "all" for lots.
klipsdebug=none
plutodebug=all
# Use auto= parameters in conn descriptions to control startup actions.
plutoload=%search
plutostart=%search
# Close down old connection when new one using same ID shows up.
uniqueids=yes
# defaults for subsequent connection descriptions
conn %default
# How persistent to be in (re)keying negotiations (0 means very).
keyingtries=2
# RSA authentication with keys from DNS.
# authby=secret
authby=rsasig
#
# use x509 certificates
#
leftrsasigkey=%cert
rightrsasigkey=%cert
#
#freeswan security gateway
left=192.168.1.20
leftsubnet=192.168.1.20/32
leftid=@host.domain.top
May 2003 15
IPSec Feasibility Study
#
keyexchange=ike
# the following is the IPSec configuration towards the “cisco” router
conn rw1
right=192.168.5.2
rightid=@host.otherdomain.top
rightsubnet=10.0.0.0/8
ikelifetime=3600
keylife=3600
pfs=no
auto=start
esp=3des-sha-96
16 May 2003
IPSec Feasibility Study
Annex B - References
A cryptographic Evaluation of IPSec - Niels Ferguson and Bruce Schneier - Counterpass
Internet Security, Inc.
Applied Cryptography - Bruce Schneier - Wiley
Cisco Secure VPN - Andre G. Mason - Cisco Press
FreeS/WAN: http://www.freeswan.org
IPSec Protocol: http://www.ietf.org/html.charters/ipsec-charter.html
IPSec RFCs - http://www.ietf.org/rfc.html
IPSec Securing VPNs - Carlton R. Davis - RSA Press
VPN Consortium: http://www.vpnc.org
May 2003 17
IPSec Feasibility Study
18 May 2003
Annex C - List of acronyms
3DES Triple Data Encryption Standard
AES Advanced Encryption Standard
AH Authentification Header
CA Certificate Authority
CRL Certificate Revocation List
DER Distinguished Encoding Rules
DES Data Encryption Standard
DH Diffie-Hellman Key Agreement
DWD Deutscher Wetterdienst
ECMWF European Centre for Medium-Range Weather Forecasts
ESP Encapsulating Security Payload
HMAC Hashed Message Authentication Code
HNMS Hellenic National Meteorological Service
IKE Internet Key Exchange
IPSec IP Security Protocol
KNMI Koninklijk Nederlands Meteorologisch Instituut
MD5 Message Digest 5
NAT Network Address Translation
PEM Privacy Enhanced Mail
PKI Public Key Infrastructure
QoS Quality Of Service
RFC Request For Comments
RMDCN Regional Meteorological Data Communication Network
RSA Rivest, Shamir, Adleman
SHA Secure Hash Algorithm

More Related Content

What's hot

SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Abhijeet Awade
 
Ipsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieeeIpsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieee
Selva Raj
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
S04404116120
S04404116120S04404116120
S04404116120
IJERA Editor
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
eSAT Publishing House
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
LeMeniz Infotech
 
794326
794326794326
794326
Vinay Kumar
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
vidyapol01
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
Finalyear Projects
 
A0320105
A0320105A0320105
A0320105
iosrjournals
 
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
IRJET Journal
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
Pooja Kundu
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Editor IJMTER
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 

What's hot (20)

SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Ipsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieeeIpsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieee
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
S04404116120
S04404116120S04404116120
S04404116120
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
794326
794326794326
794326
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
 
A0320105
A0320105A0320105
A0320105
 
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 

Viewers also liked

la finestra del costat
la finestra del costatla finestra del costat
la finestra del costat
clivijr
 
Portfolio Ilham Chaeradipura
Portfolio Ilham ChaeradipuraPortfolio Ilham Chaeradipura
Portfolio Ilham Chaeradipurachaeradipuras
 
Metodologia examinarii valorii agronomice
Metodologia examinarii valorii agronomiceMetodologia examinarii valorii agronomice
Metodologia examinarii valorii agronomice
greenaxl
 
Mohd fayez tamimi 2016 english (2)
Mohd fayez tamimi  2016 english (2)Mohd fayez tamimi  2016 english (2)
Mohd fayez tamimi 2016 english (2)
Mohd Fayez TAMIMI
 
Prakash tiwari (c[1].v)
Prakash tiwari (c[1].v)Prakash tiwari (c[1].v)
Prakash tiwari (c[1].v)girishtherock
 
السيرة الذاتية 2016
السيرة الذاتية  2016السيرة الذاتية  2016
السيرة الذاتية 2016Mohd Fayez TAMIMI
 
Cis bind benchmark_v1.0
Cis bind benchmark_v1.0Cis bind benchmark_v1.0
Cis bind benchmark_v1.0
Momita Chowdhury
 
Mathematical Theory
Mathematical TheoryMathematical Theory
Mathematical Theory
Momita Chowdhury
 
Understanding ssh
Understanding sshUnderstanding ssh
Understanding ssh
Momita Chowdhury
 
Effective selling techniques
Effective selling techniquesEffective selling techniques
Effective selling techniquesweetong
 

Viewers also liked (14)

la finestra del costat
la finestra del costatla finestra del costat
la finestra del costat
 
Portfolio Ilham Chaeradipura
Portfolio Ilham ChaeradipuraPortfolio Ilham Chaeradipura
Portfolio Ilham Chaeradipura
 
Metodologia examinarii valorii agronomice
Metodologia examinarii valorii agronomiceMetodologia examinarii valorii agronomice
Metodologia examinarii valorii agronomice
 
Mohd fayez tamimi 2016 english (2)
Mohd fayez tamimi  2016 english (2)Mohd fayez tamimi  2016 english (2)
Mohd fayez tamimi 2016 english (2)
 
Prakash tiwari (c[1].v)
Prakash tiwari (c[1].v)Prakash tiwari (c[1].v)
Prakash tiwari (c[1].v)
 
Kiểm tra 1 tiết lớp 11 lần 3
Kiểm tra 1 tiết lớp 11 lần 3Kiểm tra 1 tiết lớp 11 lần 3
Kiểm tra 1 tiết lớp 11 lần 3
 
السيرة الذاتية 2016
السيرة الذاتية  2016السيرة الذاتية  2016
السيرة الذاتية 2016
 
Cis bind benchmark_v1.0
Cis bind benchmark_v1.0Cis bind benchmark_v1.0
Cis bind benchmark_v1.0
 
Mathematical Theory
Mathematical TheoryMathematical Theory
Mathematical Theory
 
Understanding ssh
Understanding sshUnderstanding ssh
Understanding ssh
 
ดนัย
ดนัยดนัย
ดนัย
 
Kiểm tra 1 tiết lớp 11 lần 3
Kiểm tra 1 tiết lớp 11 lần 3Kiểm tra 1 tiết lớp 11 lần 3
Kiểm tra 1 tiết lớp 11 lần 3
 
Gioi han lien tuc tb
Gioi han lien tuc   tbGioi han lien tuc   tb
Gioi han lien tuc tb
 
Effective selling techniques
Effective selling techniquesEffective selling techniques
Effective selling techniques
 

Similar to Ip sec technote-en

I psec cisco
I psec ciscoI psec cisco
I psec cisco
Deepak296
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
ijceronline
 
A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPN
ijtsrd
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
Dr. Shivashankar
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
PRADEEPJ30
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
PRADEEPJ30
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
IJERA Editor
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
IRJET Journal
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
IAESIJEECS
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
IAESIJEECS
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
IRJET Journal
 
Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Mumbai Academisc
 

Similar to Ip sec technote-en (20)

Ip sec
Ip secIp sec
Ip sec
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPN
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
V P N
V P NV P N
V P N
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
Blug talk
Blug talkBlug talk
Blug talk
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
 
Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...
 

Recently uploaded

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Ip sec technote-en

  • 1. IPSec Feasibility Study May 2003 1 IPSec Feasibility Study (in cooperation with DWD, Météo France, HNMS and KNMI): Summary and recommendations Network and Security Section Computer Division May 2003
  • 2. © Copyright 2003 European Centre for Medium-Range Weather Forecasts Shinfield Park, Reading, Berkshire RG2 9AX, England Literary and scientific copyrights belong to ECMWF and are reserved in all countries. This publication is not to be reprinted or translated in whole or in part without the written permission of the Director. Appropriate non-commercial use will normally be granted under the condition that reference is made to ECMWF. The information within this publication is given in good faith and considered to be true, but ECMWF accepts no liability for error, omission and for loss or damage arising from its use.
  • 3. IPSec Feasibility Study Contents 1 Introduction .....................................................................................................................................1 2 Technical Overview.........................................................................................................................2 2.1 IP VPN definition.....................................................................................................................2 2.2 IPSec protocol ..........................................................................................................................2 3 The IPSec Tests ...............................................................................................................................3 3.1 IPSec parameter settings...........................................................................................................3 3.2 The lab tests..............................................................................................................................5 3.3 Internet tests .............................................................................................................................6 4 Test Results......................................................................................................................................7 4.1 Test #1: Certificate enrolment and device authentication ........................................................7 4.2 Test #2: Data Integrity..............................................................................................................7 4.3 Test #3: Data Encryption..........................................................................................................7 4.4 Test #4: Performance tests........................................................................................................7 5 Recommendations............................................................................................................................9 5.1 Device authentication...............................................................................................................9 5.2 Data integrity............................................................................................................................9 5.3 Data encryption ........................................................................................................................9 5.4 The IPSec capable equipment ..................................................................................................9 5.5 Network Design......................................................................................................................10 6 Acknowledgement.........................................................................................................................11 Annex A - Configuration guidelines and examples ..........................................................................13 A.1 Output and configuration files for Cisco Router and PIX......................................................13 Cisco IOS: certificate enrolment guideline....................................................................................13 Cisco IOS: enrolment output .........................................................................................................13 Cisco IOS: IPSec configuration example ......................................................................................14 Cisco PIX: configuration example.................................................................................................15 A.2 FreeS/WAN configuration example.......................................................................................15 Annex B - References.......................................................................................................................17 Annex C - List of acronyms..............................................................................................................18 May 2003 i
  • 4.
  • 5. IPSec Feasibility Study 1 Introduction During 2002 ECMWF and four Member States (Germany, Greece, France and the Netherlands) undertook IPSec tests in order to evaluate the feasibility of using an IPSec-based VPN as a back up for the RMDCN and for the transfer of amounts of data, which are excessive relative to the capacity of the RMDCN. As most RMDCN sites have Internet access, using an IPSec-based VPN link as an additional backup, in case of a failure of the RMDCN link and its associated ISDN backup, will help to guarantee service continuity. The RMDCN is a purpose-built network for real-time and operational data transfer and the various allocated bandwidths have a limited throughput. The Internet can be used in addition to the RMDCN to perform data transfer for cases where the RMDCN capacity is insufficient. However, it is worth keeping in mind that: The Internet lacks the concept of guaranteed bandwidth and QoS (Quality of Service) and is subject to various attacks, including DoS (Denial of Service) attacks. Long lasting outages occur on the Internet from time to time This document reports on the results of the IPSec tests and provides guidelines and recommendations for building secure connections over the Internet. It is divided into four parts: Part 1 gives a brief introduction to Virtual Private Networks and IPSec. Part 2 describes the IPSec tests that were carried out. Part 3 presents the results of the tests. Part 4 details the recommendations. May 2003 1
  • 6. IPSec Feasibility Study 2 Technical Overview 2.1 IP VPN definition A Virtual Private Network is a group of two or more computer systems connected “securely” over a public network. VPNs can be installed between an individual machine and a private network (remote user-to-site) or between private networks (site-to-site). Security features differ from product to product, but most security experts agree that VPNs should include encryption, strong authentication of remote users or hosts, and mechanisms for hiding or masking information about the private network topology from potential attackers on the public network. 2.2 IPSec protocol IPSec is an end-to-end security protocol: all the functionality and intelligence of the VPN connection reside at the end points, either in a gateway or in the end-host. The service provider’s IP network is not aware of the existence of the IP VPN, as tunnelling technologies ensure the transport of application data by encapsulation. The source address and the destination address of these packets are the IP addresses of the end points of the tunnel. They are then routed as any normal IP packets through the shared IP network. In the past, several IP tunnelling protocols have been deployed. Over the last 3 years, however, IPSec has become the predominant IP tunnelling protocol and is currently the technology of choice when implementing site-to-site connectivity over a public network. IPSec was initially developed to ensure private communications over public IP networks. The protocol supports two main security functions: Authentication: ensuring the authenticity and the integrity of the whole IP packet; Encryption: ensuring the confidentiality of the payload. Through IPSec it is possible to define a tunnel between two gateways. An IPSec gateway would typically be an access router or a firewall on which the IPSec protocol is implemented. IPSec gateways sit between the user's private network and the carrier's shared network. IPSec tunnels are established dynamically and released when they are not in use. To establish an IPSec tunnel, two gateways must authenticate themselves and define which security algorithms and keys they will use for the tunnel. The entire original IP packet is encrypted and wrapped inside IPSec authentication and encryption headers. This becomes the payload of a new IP packet whose source and destination IP addresses are the public network IP addresses of the IPSec gateways. This ensures the logical separation between VPN traffic flows in a shared IP network. Traditional IP routing is then used between the tunnel end points. IPSec achieves these objectives by using: Two traffic security protocols: the Authentication Header (AH), which provides data integrity, and the Encapsulation Security Payload (ESP), which provides data integrity and data confidentiality. A cryptographic-key management protocol: the Internet Key Exchange (IKE), which is used to negotiate IPSec connections. For further information about IPSec protocol, see the list of References in Annex B. 2 May 2003
  • 7. IPSec Feasibility Study 3 The IPSec Tests The main goals of these tests were: Evaluate the feasibility of using IPSec tunnels to establish site-to-site connectivity: Although several documents have been written regarding the implementation of IPSec and its various issues, it was worth testing it, in order to gain a thorough understanding of the IPSec protocol itself, to have an appreciation of its complexity and to evaluate the feasibility of its implementation in the context of the RMDCN. Test the interoperability of IPSec : The meteorological centres connected to the RMDCN may already have some equipment (router, firewall, etc.), which is IPSEC capable. Even if interoperability will not be an issue today, the interoperability of different devices has to be checked. Define global recommendations: RMDCN sites that are considering implementations of IPSec can use this document and its recommendations as a starting point. 3.1 IPSec parameter settings As it was not feasible to test all IPSec features and capabilities, the tests focused on a subset. An initial option was chosen for each IPSec parameter: Tunnel mode vs. Transport mode Both AH and ESP protocols operate in two modes: transport mode and tunnel mode. Each of these modes has its wn applications: Tunnel mode is commonly used to encrypt traffic between secure IPSec gateways. Transport mode is used between end stations supporting IPSec or between an end station and a gateway, if the gateway is regarded as a host. As the aim of the tests was to investigate secure site-to-site connections, only IPSec “Tunnel mode” was considered (see Figure 1 below) in the framework of this study. Router ECMWF Router IPSec/VPN Equipment INTERNET IPSec Tunnel IPSec Tunnel Figure 1 - IPSec “Tunnel mode” tests Key exchange IPSec Tunnel keys can be managed either manually or dynamically. For scalability and maintainability reasons, IKE was used for the dynamic key management during the tests. May 2003 3
  • 8. IPSec Feasibility Study Device authentication method The IKE protocol is very flexible and supports multiple authentication methods. The two peers must agree on a common authentication method through a negotiation process. The two main authentication protocols are: PreShared key: The same key is configured on each IPSec peer. IKE peers authenticate each other by computing and sending a keyed hash of data using the configured PreShared key. If the receiving peer is able to create the same hash independently using its own PreShared key, it knows that both peers must share the same secret, thus authenticating the other peer. RSA (Rivest, Shamir, Adleman) Signature: This uses a digital signature, where each device digitally signs a set of data and sends it to the other party. RSA signatures use a CA (Certificate Authority) to generate a unique digital certificate that is assigned to each peer for authentication. The digital certificate is similar in function to the PreShared key, but provides much stronger security. PreShared keys are easy to implement but do not scale well, as each IPSec peer must be configured with the PreShared key of every other peer with which it will establish a session. In addition, PreShared keys are less secures and are configured in clear text format in some equipment, for example in a Cisco router. Therefore, RSA signatures using x509 v.3 certificates were used. Data integrity and authenticity Data integrity is implemented by including a message digest (or fingerprint) of the data within the IPSec packets. Message digests are calculated using hash functions. All IPSec capable devices should support hash functions HMAC-MD5 and HMAC-SHA, as stated in the RFC (Request For Comments) 2401. Therefore, other less commonly used hash functions were ignored. HMAC-MD5 and HMAC- SHA are based on MD5 and SHA combined with the additional crypto features of the HMAC algorithm. This is done to avoid tampering with the message digest itself. MD5 produces a 128-bit message digest and SHA produces a 160-bit message digest, therefore SHA is a more secure hash function than MD5. However, the HMAC-SHA and HMAC-MD5 variants used are truncated to the most significant 96 bits. Truncation has security advantages (less information on the hash available to the attacker) and disadvantages (less bits to predict for the attacker). In our opinion both truncated versions of HMAC-SHA and HMAC-MD5 are secure enough for our requirements. In our test environment, both HMAC-SHA and HMAC-MD5 were used; there was a slight preference for HMAC-SHA. Data encryption Data confidentiality is achieved in IPSec by the use of symmetric encryption algorithms and session keys. The most commonly used algorithms are: ESP-NULL: No encryption applied. DES (Data Encryption Standard): Provides encryption using a 56 bit key. 3DES (Triple Data Encryption Standard): Provides encryption using a 168 bit key. AES (Advanced Encryption Standard): Provides encryption using 128, 192, and 256 key lengths. According to RFC 2401, all IPSec devices should support at least ESP-NULL and DES. However, DES is considered a weak encryption algorithm due to its short key length, and as such, some vendors discourage its use and some others refuse to support it (i.e. FreeS/Wan). Therefore, for the purpose of this test, NULL (no encryption) and 3DES encryption were used whenever possible. DES was only used when 3DES was not available. 4 May 2003
  • 9. IPSec Feasibility Study An international VPN/IPSec via Internet must comply with the legislation of each country (encryption, size of the key…). Therefore, each site should be aware of national policy before using encryption. Session key exchange Diffie-Hellman (DH) is a public-key cryptography protocol. It allows two parties to establish a shared secret between them. DH is used within IKE to establish a shared secret that is used as a session key. The most common DH groups are: Group 1: Uses a 768 bit public key to establish a shared secret. Group 2: Uses a 1024 bit public key to establish a shared secret. For the purpose of the tests, DH Group 2 was used since it is more secure and does not create any overhead for the IPSec devices. 3.2 The lab tests In order to validate the selected parameter settings of the IPSec features and before performing any external (through the Internet) tests, a test environment was set up at ECMWF to conduct some preliminary experiments. The aim of these tests was to get familiarised with IPSec configuration and the certificate enrolment process. Figure 2 shows the configuration of the test environment. Internet Firewall Linux s/WAN Server DMZ Back-to-Back DMZ CA Server IPSec Tunnel X509 Certificates Exchange Test RouterInternet Access Router Figure 2 - Network configuration test environment May 2003 5
  • 10. IPSec Feasibility Study With this setup, we were able to: Test three different authentication methods: PreShared keys, public encryption (RSA_ENCR) and public keys signed by a Certification Authority (RSA_SIG). Test X509 certification enrolment and utilisation. Perform basic IPSec configuration: build tunnels with the chosen IKE/IPSec parameters. Test a public domain IPSec implementation: FreeS/WAN Test IPSec interoperability between several devices. The test environment was also used during the Internet tests to reproduce problems in order to fix them. 3.3 Internet tests Figure 3 shows an overall view of the IPSec tests performed across the public Internet. The objective of these Internet tests was to build secure connections between ECMWF and the Member States and use them to transfer data. Configuration examples can be found in Annex A. X509 Certifcate Exchange Test Router Linux FreeS/WAN Test Router FRANCE - MeteoFrance NETHERLANDS - KNMI FireWall Test Router GERMANY - DWD GREECE - HNMS FireWall UK - ECMWF Internet Access Router DMZ DMZ CA Server Internet Access Device INTERNET FireWall FireWall Internet Access Device Internet Access Device Internet Access Device IPSec Tunnel Figure 4 - Network configuration for the Internet tests 6 May 2003
  • 11. IPSec Feasibility Study 4 Test Results The following sections briefly describe the four tests conducted with the Member States and highlight some of the experiences. 4.1 Test #1: Certificate enrolment and device authentication The purpose of this test was to see how the different devices would go through the certificate enrolment process and use the X509 certificate for device authentication. If there were problems with devices using X509 certificates, PreShared keys were configured manually in the device. Most of the tested devices succeeded in enrolling and using certificates for authentication1 . The main issues encountered during this test were due to the fact that the devices use different certificate enrolment methods (mainly URL and “out-of-band” download) and diverse certificate formats. 4.2 Test #2: Data Integrity The purpose of this test was to establish basic IPSec connections using HMAC (SHA and MD5) algorithm to check the data integrity. The IKE negotiation used the X509 certificate downloaded from the CA server. Except for FreeS/WAN, which does not implement the AH protocol, all the tested devices were able to establish AH and ESP HMAC IPSec tunnels. 4.3 Test #3: Data Encryption This test is a follow-up of test #2; it adds 3DES encryption. When 3DES was not available, DES was used. The tests were carried out successfully. However, it is important to take into account that 3DES/DES encryption capability depends on the device hardware and software versions. 4.4 Test #4: Performance tests In order to evaluate the impact of IPSec tunnelling on the CPU, a set of FTP tests was undertaken. Several FTP tests were carried out, both with and without the establishment of IPSec tunnels. The configuration below (Figure 5) was used to conduct the FTP tests; router B represents a generic remote router that guarantees the Internet connection to and from a Member State. IPSec Tunnel Back-to-Back 30.0.0.1 40.0.0.2 Ethernet New-ftp FTP server Laptop Back-to-Back 10.0.0.1 10.0.0.2 Back-to-Back 20.0.0.1 20.0.0.2 30.0.0.2 40.0.0.1 Router BRouter A Router Router FTP Transfer Figure 5 - FTP Tests Lab Setup 1 CheckPoint FW1 equipment: only the enrolment of the certificate was tested. FW1 requires a Control Revocation List (CRL) to start the IPSec process. The use of CRLs was not included in the tests. This will be done at a future stage. May 2003 7
  • 12. IPSec Feasibility Study Tests were also conducted across the Internet between ECMWF and a Cisco PIX firewall at DWD in Germany. The main conclusions from the performance tests are: IPSec protocol has a significant impact on the CPU load of the device. Encrypted tunnels are more CPU consuming than non-encrypted ones. HMAC-MD5 algorithm is slightly less CPU consuming than HMAC-SHA algorithm. ESP protocol for data integrity is equally as CPU consuming as AH protocol. A small IPSec capable router (such as a Cisco 1605) is not suitable for IPSec tunnelling when the Internet connection speed is higher than 128 kb/s. 8 May 2003
  • 13. IPSec Feasibility Study 5 Recommendations The following recommendations are based on the results of the tests described in section 3. These recommendations should help sites to build secure IPSec connections over the public Internet. 5.1 Device authentication The use of X509 certificates for device authentication is recommended for the following reasons: It is the most secure method. It is the most scalable method. Furthermore, the generation of 1024 bit RSA keys and the use of DH group 2 (encryption algorithm) are recommended. 5.2 Data integrity Both AH and ESP protocols can be used for packet authentication. However: The tests showed that ESP consumes as much CPU load as AH. Only ESP protocol can ensure packet encryption (see Section 4.3). Therefore, for reasons of simplicity the use of ESP HMAC for packet authentication is recommended. Also, either ESP-HMAC-MD5 or ESP-HMAC-SHA can be used. 5.3 Data encryption Because of the nature of the data (meteorological) encryption is not strictly required. Since data encryption is CPU consuming ensuring packet authentication provides enough security. Therefore, the use of ESP NULL is recommended. This means that ESP will be applied to the packet with no encryption. If ever data encryption is needed, the implementation of ESP-3DES is recommended, as it is more secure than DES. 5.4 The IPSec capable equipment In the light of the previous recommendations (Sections 4-1 to 4-3), the following should be considered, when selecting an IPSec-capable device to implement a VPN: For scalability reasons, the device should be IKE capable and should support X509 certificate standard. It is important that the device supports ESP_NULL encryption method. If considering data encryption, the equipment must be 3DES-capable. Moreover, it should be taken into account that AES may soon become the de facto encryption standard. Therefore, equipment that is also AES-capable is desirable, in order to anticipate future requirements. For sites with a high speed Internet connection, a dedicated VPN/IPSec device with encryption card (acceleration card) is recommended, as it significantly reduces the CPU load when the IPSec protocol is used. As a final note, the tests showed that it is easier to configure IPSec-capable equipment than to implement a public domain solution. Nevertheless, an open source implementation, FreeS/WAN, could be considered, bearing in mind that FreeS/WAN implements 3DES encryption by default (refer to http://www.freeswan.org for further details). May 2003 9
  • 14. IPSec Feasibility Study 5.5 Network Design When designing an IPSec implementation, a set of guidelines has to be taken into account. The VPN gateway should always be in a DMZ and never inside the “private” network. This means that the VPN device has to be somewhere between a Firewall and the external network (the Internet); all the traffic between the VPN device and the private internal network should go through a Firewall, see Figure 6. Because the VPN device is located on a DMZ, it is important to configure the Firewall to allow IPSec traffic to and from it. The following table shows the IP protocols and TCP/UDP port numbers a Firewall has to allow for IPSec to work: Protocol/Port Comment: IP protocol 50 ESP protocol IP Protocol 51 AH protocol UDP 500 IKE negotiation UDP/TCP 10000 NAT tunnelling To implement IPSec, it is not mandatory to use a dedicated IPSec device. It is possible to combine IPSec and firewall capabilities or IPSec and Internet access capabilities or all three capabilities in a single device. The following diagram (Figure 6) shows a topology on which a dedicated VPN/IPSec device is used in addition to the Internet access router and the Firewall. INTERNET Firewall INTERNET DMZ VPN DMZ VPN/IPSec DEVICE IPSec Tunnel X509 Certificates Exchange (IKE) INTERNET LAN INTERNET ACCESS DEVICE Figure 6 - VPN Network Design using a dedicated VPN device 10 May 2003
  • 15. IPSec Feasibility Study 6 Acknowledgement The following persons contributed to the study and the creation of this document: Inge Essid, DWD Ilona Glaser, DWD Erwan Favennec, Meteo France Georgios Konstandinidis, HNMS Frits van de Peppel, KNMI Freerk Feunekes, KNMI Carmine Rizzo, ECMWF Ahmed Benallegue, ECMWF Matteo dell'Acqua, ECMWF Ricardo Correa, ECMWF Tony Bakker, ECMWF Pam Prior, ECMWF May 2003 11
  • 17. IPSec Feasibility Study Annex A - Configuration guidelines and examples A.1 Output and configuration files for Cisco Router and PIX Cisco IOS: certificate enrolment guideline The main points to consider when requesting a certificate from a Cisco Router are: 1- Configure the Router's Host Name and Domain Name: Use “hostname” and “ip domain-name” global configuration commands. 2- Set the Router's Time and Date: ensure that the router's time zone, time and date have been accurately configured with the “set clock” command. The clock must be set before generating RSA key pairs and enrolling the certificate, as the keys and certificates are time-sensitive. 3- RSA key pairs must be generated using a modulus of 1024: using the “crypto key generate rsa” command, generate RSA key pairs with a modulus of 1024. 4- Declare the CA and configure its parameters: o To declare the CA: “crypto ca identity <CA identity>” o To configure its parameters: “enrolment url <CA server URL>” and “crl optional” o To authenticate the CA: “ca authenticate <CA identity>” 5- Request a X509 certificate: when requesting a X509 certificate, answer “no” when asked if you want to include: o The router serial number o An IP address in the subject name Cisco IOS: enrolment output The following is the output from a certificate enrolment performed on a Cisco router: ! The first step is to generate the RSA key Cisco-Test(config)#crypto key generate rsa The name for the keys will be: mys-cisco.domain.top Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: 1024 Generating RSA keys ... [OK] ! The second step is to identify the CA server Cisco-Test(config)#ca iden Cisco-Test(config)#crypto ca identity my-test Cisco-Test(ca-identity)# enrollment url http://myca.domain.top/cgi-bin/openscep Cisco-Test(ca-identity)# crl optional Cisco-Test(ca-identity)#exit Cisco-Test(config)#crypto ca authenticate my-test Certificate has the following attributes: Fingerprint: 8395FE5B C08238A7 FA6BFD76 727E84A7 % Do you accept this certificate? [yes/no]: yes ! The third step is to request a certificate from the CA server Cisco-Test(config)#crypto ca enrol my-test % % Start certificate enrollment .. % Create a challenge password. You will need to verbally provide this password to the CA Administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. Password: Re-enter password: % The subject name in the certificate will be: my-cisco.domain.top % Include the router serial number in the subject name? [yes/no]: no % Include an IP address in the subject name? [yes/no]: no Request certificate from CA? [yes/no]: yes % Certificate request sent to Certificate Authority % The certificate request fingerprint will be displayed. % The 'show crypto ca certificate' command will also show the fingerprint. Cisco-Test(config)#exit May 2003 13
  • 18. IPSec Feasibility Study Cisco-Test# ! Once the 3 steps are completed, two certificates are available in the router: the CA certificate and the router‘s certificate Cisco-Test#show crypto ca certificates CA Certificate Status: Available Certificate Serial Number: 01 Key Usage: General Purpose EA =<16> ca-email@domain.top CN = Org O = Org L = Place ST = county C = Country Validity Date: start date: 08:51:38 GMT Apr 9 2002 end date: 08:51:38 GMT Apr 8 2012 Certificate Status: Available Certificate Serial Number: 3F Key Usage: General Purpose Subject Name Name: my-test.domain.top Validity Date: start date: 15:56:14 GMT Jun 12 2002 end date: 15:56:14 GMT Jun 13 2007 Cisco IOS: IPSec configuration example The following is an ESP-HMAC-SHA ESP-NULL IPSec tunnel configuration example: hostname Cisco ! ! The time zone must be accurate, as the certificates are time sensitive clock timezone GMT 0 ! ! The following lines describe the CA server name and IP address ip host myca.domain.top 191.168.1.1 ip domain-name domain.top ! ! CA identity command specifies the local name of the CA server crypto ca identity my-test enrollment url http://myca.domain.top/cgi-bin/openscep crl optional ! ! The following lines are the certificates available in the router crypto ca certificate chain my-test certificate 36 30820338 308202A1 A0030201 02020136 300D0609 2A864886 F70D0101 04050030 **** B49B0FEF 07921B58 B9BD54B2 0713AE83 B6BA3CB4 B8D30EA8 95005EEA quit certificate ca 01 30820379 308202E2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 **** 9A81DB7F 902EE833 800B9487 9634907E 9333BE95 88900068 7889AB95 51 quit ! ! The isakmp (ike) policy parameters are used when the router tries to establish the IKE tunnel crypto isakmp policy 100 group 2 ! crypto isakmp policy 200 encr 3des group 2 ! ! “transform-set” command defines which kind of IPSec tunnelit is possible to establish crypto ipsec transform-set MoreSecure esp-sha-hmac esp-null ! ! A crypto-map links a set of IPSec parameters with the remote IPSec gateway crypto map IOS_IOS 10 ipsec-isakmp description To Cisco-Test internal router set peer 10.0.0.1 set transform-set MoreSecure match address 151 ! ! Finally, a crypto-map that will be used to establish IPSec tunnels is applied to the physical interface interface FastEthernet4/0 ip address 10.0.0.2 255.0.0.0 crypto map IOS_IOS ! ! The mirror ACL will trigger the IPSec tunnel establishment access-list 151 permit ip host 192.168.1.2 host 192.168.2.1 log end 14 May 2003
  • 19. IPSec Feasibility Study Cisco PIX: configuration example The following is a ESP-HMAC-SHA ESP-NULL IPSec tunnel configuration example for a Cisco PIX: PIX Version 6.2(1) hostname pix domain-name domain.top ! **** ! ! The following ACL will be used to trigger the IPSec tunnel establishment access-list 101 permit ip host 192.168.3.1 host 192.168.1.2 ! IPSec protocol must be enabled in the device sysopt connection permit-ipsec no sysopt route dnat ! “transform-set” command defines which kind of IPSec tunnel it will be possible to establish crypto ipsec transform-set MoreSecure2 esp-null esp-sha-hmac ! A crypto map defines the IPSec parameters, which will be negotiated during the IPSec tunnel establishment crypto map ECMWF_MSS 50 ipsec-isakmp crypto map ECMWF_MSS 50 match address 101 crypto map ECMWF_MSS 50 set peer 192.168.4.1 crypto map ECMWF_MSS 50 set transform-set MoreSecure crypto map ECMWF_MSS interface outside ! The isakmp (ike) policy parameters are used when the device tries to establish the IKE tunnel isakmp enable outside isakmp policy 10 authentication rsa-sig isakmp policy 10 encryption des isakmp policy 10 hash sha isakmp policy 10 group 2 isakmp policy 10 lifetime 86400 ca identity myca.domain.top 192.168.1.19:/cgi-bin/openscep ca configure myca.domain.top ca 1 1 crloptional A.2 FreeS/WAN configuration example FreeS/WAN (ipsec.conf) configuration file for an ESP-HMAC-SHA ESP-3DES configuration example: # /etc/ipsec.conf - FreeS/WAN IPsec configuration file # More elaborate and more varied sample configurations can be found # in FreeS/WAN's doc/examples file, and in the HTML documentation. # basic configuration config setup # THIS SETTING MUST BE CORRECT or almost nothing will work; # %defaultroute is okay for most simple cases. interfaces=%defaultroute # Debug-logging controls: "none" for (almost) none, "all" for lots. klipsdebug=none plutodebug=all # Use auto= parameters in conn descriptions to control startup actions. plutoload=%search plutostart=%search # Close down old connection when new one using same ID shows up. uniqueids=yes # defaults for subsequent connection descriptions conn %default # How persistent to be in (re)keying negotiations (0 means very). keyingtries=2 # RSA authentication with keys from DNS. # authby=secret authby=rsasig # # use x509 certificates # leftrsasigkey=%cert rightrsasigkey=%cert # #freeswan security gateway left=192.168.1.20 leftsubnet=192.168.1.20/32 leftid=@host.domain.top May 2003 15
  • 20. IPSec Feasibility Study # keyexchange=ike # the following is the IPSec configuration towards the “cisco” router conn rw1 right=192.168.5.2 rightid=@host.otherdomain.top rightsubnet=10.0.0.0/8 ikelifetime=3600 keylife=3600 pfs=no auto=start esp=3des-sha-96 16 May 2003
  • 21. IPSec Feasibility Study Annex B - References A cryptographic Evaluation of IPSec - Niels Ferguson and Bruce Schneier - Counterpass Internet Security, Inc. Applied Cryptography - Bruce Schneier - Wiley Cisco Secure VPN - Andre G. Mason - Cisco Press FreeS/WAN: http://www.freeswan.org IPSec Protocol: http://www.ietf.org/html.charters/ipsec-charter.html IPSec RFCs - http://www.ietf.org/rfc.html IPSec Securing VPNs - Carlton R. Davis - RSA Press VPN Consortium: http://www.vpnc.org May 2003 17
  • 22. IPSec Feasibility Study 18 May 2003 Annex C - List of acronyms 3DES Triple Data Encryption Standard AES Advanced Encryption Standard AH Authentification Header CA Certificate Authority CRL Certificate Revocation List DER Distinguished Encoding Rules DES Data Encryption Standard DH Diffie-Hellman Key Agreement DWD Deutscher Wetterdienst ECMWF European Centre for Medium-Range Weather Forecasts ESP Encapsulating Security Payload HMAC Hashed Message Authentication Code HNMS Hellenic National Meteorological Service IKE Internet Key Exchange IPSec IP Security Protocol KNMI Koninklijk Nederlands Meteorologisch Instituut MD5 Message Digest 5 NAT Network Address Translation PEM Privacy Enhanced Mail PKI Public Key Infrastructure QoS Quality Of Service RFC Request For Comments RMDCN Regional Meteorological Data Communication Network RSA Rivest, Shamir, Adleman SHA Secure Hash Algorithm